CVE-2025-2369

8.8 HIGH

📋 TL;DR

A critical stack-based buffer overflow vulnerability in TOTOLINK EX1800T routers allows remote attackers to execute arbitrary code by manipulating the admpass parameter in the setPasswordCfg function. This affects all TOTOLINK EX1800T routers running firmware version 9.1.0cu.2112_B20220316 or earlier. Attackers can exploit this without authentication to potentially take full control of affected devices.

💻 Affected Systems

Products:
  • TOTOLINK EX1800T
Versions: Up to and including 9.1.0cu.2112_B20220316
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected firmware versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, creation of persistent backdoors, lateral movement to internal networks, and botnet recruitment.

🟠

Likely Case

Remote attackers gain administrative access to the router, modify network settings, intercept traffic, and use the device as a pivot point for further attacks.

🟢

If Mitigated

If properly segmented and monitored, exploitation may be detected and contained before significant damage occurs.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable without authentication on internet-facing devices.
🏢 Internal Only: MEDIUM - Internal devices are still vulnerable but require network access; risk depends on internal segmentation.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code is available, making exploitation straightforward for attackers with basic skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check TOTOLINK for firmware newer than 9.1.0cu.2112_B20220316

Vendor Advisory: https://www.totolink.net/

Restart Required: Yes

Instructions:

1. Visit TOTOLINK support website. 2. Download latest firmware for EX1800T. 3. Log into router admin interface. 4. Navigate to firmware upgrade section. 5. Upload and apply new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Disable WAN administration

all

Prevent remote access to router administration interface from internet

Network segmentation

all

Isolate affected routers in separate VLAN with restricted access

🧯 If You Can't Patch

  • Immediately remove affected devices from internet-facing positions
  • Implement strict network access controls and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface; if version is 9.1.0cu.2112_B20220316 or earlier, device is vulnerable.

Check Version:

Login to router admin interface and check System Status or Firmware Version page

Verify Fix Applied:

After firmware update, verify version is newer than 9.1.0cu.2112_B20220316 and test that setPasswordCfg function no longer accepts oversized admpass values.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts to /cgi-bin/cstecgi.cgi
  • Unusual POST requests with oversized admpass parameter
  • Router configuration changes without authorized user action

Network Indicators:

  • Unusual outbound connections from router
  • Traffic patterns indicating command and control communication
  • Port scanning originating from router

SIEM Query:

source="router_logs" AND (uri="/cgi-bin/cstecgi.cgi" AND (method="POST" AND content_length>1000))

🔗 References

📤 Share & Export